Reconnaissance - Questions and Answers with Gilbert Oviedo
Can you explain the concept of the reconnaissance phase in the cyber kill chain? Why is it critical to cyber …
Dark Web Reconnaissance: The Art of Uncovering the Hidden Adversaries
Introduction The cyber kill chain is the intelligence-driven defense framework developed by Lockheed Martin. It is a seven-stage model that …
Strategies for Defending Against Kill Chain Reconnaissance
Introduction Recent cyberattacks attributed to advanced persistent threat (APT) groups linked with nation-states have exposed their expanding capabilities when it …
Security Implications of Serverless Computing in the Cloud
Abstract The promise of easier development, scalability, and cost-effectiveness has made serverless computing quite popular in recent years. But this …
Weaponizing Raspberry Pi with The PenTesters Framework
Raspberry Pi Single Board Computers are used very frequently in security. The small and inexpensive units work very well for …
Writing A Simple Ransomware Using Python
Introduction: Ransomware is a program designed to prevent a user or organization from accessing files on their computers. It encrypts …
Exclusive Interview with Alexandre Teyar - the creator of BurpGPT
Dear Readers, Burp Suite and ChatGPT have been hot topics in the world of Cybersecurity. That is why we have …
Hashcat: A Beginner's Guide
Disclaimer: This is intended to be used solely for ethical purposes. Please make sure you don't try the below-discussed methods …
Exploiting SQL injection using acunetix vulnerability scanner and sqlmap
SQL injection (SQLi) SQLi is the most well-known of all web application flaws and most web application security professionals have …
The Dark Web
What exactly is the Dark Web? This is a secret part of the internet that’s hidden from the current surface …
Top Hacking Tools & Techniques for 2024
Introduction The territory of ethical hacking and penetration testing has undergone a significant transformation and automated pen testing tools have …
Cyber Counter-Terrorism: Shutdown
Breaking through the vulnerabilities of fear From here, a perspective will be addressed regarding the power of information security as …
Engaging Social Engineering: Extracting Information through Strategic Interactions
Editorial note: We decided to remove any and all last names from the examples section as to not be drawn …
When PT in ChatGPT refers to Penetration Testing
Reconnaissance and scanning A word of caution: this article makes considerable use of concepts such as Sarcasm and Irony. If …
Metasploit from Scratch
Introduction Metasploit Framework is a penetration testing technology that has new and enhanced capabilities, including automation APIs, evasion modules, and …
Cyber Threat with Chat GPT
Repetitive tasks, tons of labor hours going into mundane tasks, delayed response to complex customer queries and lack of real-time …
Protecting Yourself From People Like Me
As a pentester, part of my job is running social engineering exercises. To be successful, I look for information I …
Slicing the Onion: An introduction to the Onion Routing
When you first searched for information about terms like “Tor network”, “deep web” or “dark web” you probably ended up …
Impact of Artificial Intelligence on Cybersecurity
Impact of Artificial Intelligence on Cybersecurity Current advances in Artificial Intelligence (AI) are widely impacting the cybersecurity industry. Companies are …
Dynamic SQLIA Detection with PHP
Introduction We’re going to discuss a dynamic approach to detect an SQL Injection Attack (SQLIA) based on a static pattern …
A review of some encryption methodologies and an introduction to a new methodology that may challenge the National Security Agency.
Encrypting information is not new; it's as old as the Roman Empire and even further back than that. Today the …
Getting Offensive with Go
Introduction Creating Reverse Shells and bypassing Anti-Virus (AV) with Golang. Using Golang in security has become very popular over the …
Modern Special Forces Of The Future (Air, Land, Sea, Cyber)
The world is becoming more complicated and unpredictable, which means that the world's armed forces need to evolve in order …
DDoS ATTACK ORCHESTRATION ON THE DARK WEB: AN OVERVIEW BEHIND THE SCENES OF A CYBERTHREAT
INTRODUCTION The internet has become a huge and diversified area in the digital age, enabling communication, access to information, and …
Reconnaissance - Questions and Answers with Gilbert Oviedo
Can you explain the concept of the reconnaissance phase in the cyber kill chain? Why is it critical to cyber …
Dark Web Reconnaissance: The Art of Uncovering the Hidden Adversaries
Introduction The cyber kill chain is the intelligence-driven defense framework developed by Lockheed Martin. It is a seven-stage model that …
Strategies for Defending Against Kill Chain Reconnaissance
Introduction Recent cyberattacks attributed to advanced persistent threat (APT) groups linked with nation-states have exposed their expanding capabilities when it …
Security Implications of Serverless Computing in the Cloud
Abstract The promise of easier development, scalability, and cost-effectiveness has made serverless computing quite popular in recent years. But this …
AWS Security Essentials: Building a Resilient Cloud Defense (W74)
"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.
Create Your Own Command & Control Tool with Golang (W73)
Enter a short description of the course.
Kismet Wireless: Network Monitoring and Analysis (W72)
COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …